Computer Science ›› 2006, Vol. 33 ›› Issue (9): 74-75.

Previous Articles     Next Articles

  

  • Online:2018-11-17 Published:2018-11-17

Abstract: Destroying computer network of distributed attack becoming severer and severer. Topology is dynamic during operation of computer network. How to discover and hold back attacks in this case? A model based on mobile agent technology is presented in this pap

Key words: Intrusion detection, Intrusion holding back, Mobile agent, Dynamic topology

No related articles found!
Viewed
Full text


Abstract

Cited

  Shared   
  Discussed   
No Suggested Reading articles found!